Browse by Journal
![]() | See full list of headings |
Number of items: 2.
C
Cheng, Xiaochun ORCID: https://orcid.org/0000-0003-0371-9646, Ma, Xiaoqi, Huang, Scott C.-H. and Cheng, Maggie
(2010)
Mechanical verification of cryptographic protocols.
Network Security
.
pp. 97-115.
ISSN 1353-4858
[Article]
(doi:10.1007/978-0-387-73821-5_5)
K
Khan, Shafiullah and Loo, Jonathan (2009) Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks. Network Security, 2009 (5) . pp. 9-16. ISSN 1353-4858 [Article] (doi:10.1016/S1353-4858(09)70053-4)